Current ThreatQ Version Filter
 

CrowdStrike Insight EDR CDF

The web format of this guide reflects the most current release.  Guides for older iterations are available in PDF format.  

Integration Details

ThreatQuotient provides the following details for this integration:

Introduction

The CrowdStrike Insight EDR CDF for ThreatQ gives analysts the ability to ingest detection incidents from CrowdStrike.

The integration provides the following feeds:

  • CrowdStrike Insight EDR - Detections - brings in aggregated detections, along with their behavioral events and related IOCs, into ThreatQ.
  • Get Detections by IDs (supplemental) - fetches the full details for a given set of detection IDs.
  • CrowdStrike Insight EDR - Hosts -  feeds brings in aggregated detections into ThreatQ.
  • Get Host by IDs (supplemental) - fetches the full details for a given host IDs.

The following object types are ingested from the feeds above:

  • Assets
  • Attack Patterns
  • Events
  • Incidents
  • Indicators
    • Filename
    • File Path
    • IP Address
    • Username
    • MD5
    • SHA-256
    • FQDN
    • Registry Key

Prerequisites

The following is required to install and use the integration:

CrowdStrike API Client Configuration

Users are required to create a properly scoped API Client within CrowdStrike's platform in order use the operation. API Clients can be created and configured via the API Clients and Keys page under Support.

The CrowdStrike Insight EDR CDF requires the following scope permission:

  • Hosts - Read permission required.
    Hosts Scope - Read

Asset Object

The integration requires the Asset object.  The Asset installation files are included with the integration download on the ThreatQ Marketplace.  The Asset object must be installed prior to installing the integration.  

You do not have to install the Asset object if you are running ThreatQ version 5.10.0 or greater as the object has been seeded as a default system object.

Use the steps provided to install the custom object.    

When installing the custom objects, be aware that any in-progress feed runs will be cancelled, and the API will be in maintenance mode.

  1. Download the integration zip file from the ThreatQ Marketplace and unzip its contents.  
  2. SSH into your ThreatQ instance.
  3. Navigate to tmp directory:
    cd /tmp/
  4. Create a new directory:
    mkdir crowdsrike_edr_cdf
  5. Upload the asset.json and install.sh script into this new directory.
  6. Create a new directory called images within the crowdstrike_edr_cdf directory.
    mkdir images
  7. Upload the asset.svg 
  8. Navigate to the /tmp/crowdstrike_edr_cdf.

    The directory should resemble the following:

    • tmp
      • crowdstrike_edr_cdf
        • asset.json
        • install.sh
        • images
          • asset.svg
  9. Run the following command to ensure that you have the proper permissions to install the custom object:
    chmod +x install.sh
  10. Run the following command:
    sudo ./install.sh

    You must be in the directory level that houses the install.sh and json files when running this command.

    The installation script will automatically put the application into maintenance mode, move the files to their required directories, install the custom object, update permissions, bring the application out of maintenance mode, and restart dynamo.

    Asset Installation Output

  11. Remove the temporary directory, after the custom object has been installed, as the files are no longer needed:
    rm -rf crowdstrike_edr_cdf

Installation

The CDF requires the installation of the Asset custom object before installing the actual CDF if your are on ThreatQ version 5.9.0 or earlier.  See the Prerequisites chapter for more details.  The custom object must be installed prior to installing the CDF.  Attempting to install the CDF without the custom object will cause the CDF install process to fail.   

Perform the following steps to install the integration:

The same steps can be used to upgrade the integration to a new version.

  1. Log into https://marketplace.threatq.com/.
  2. Locate and download the integration zip file.
  3. Unzip its contents and install the custom object if you are on ThreatQ version 5.9.0 or earlier.
  4. Navigate to the integrations management page on your ThreatQ instance.
  5. Click on the Add New Integration button.
  6. Upload the yaml file using one of the following methods:
    • Drag and drop the file into the dialog box
    • Select Click to Browse to locate the integration file on your local machine

    ThreatQ will inform you if the feed already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the feed contains changes to the user configuration. The new user configurations will overwrite the existing ones for the feed and will require user confirmation before proceeding.

  7. If prompted, select the individual feeds to install and click Install. The feed will be added to the integrations page. 

You will still need to configure and then enable the feed.

Configuration

ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.

To configure the integration:

  1. Navigate to your integrations management page in ThreatQ.
  2. Select the Commercial option from the Category dropdown (optional).

    If you are installing the integration for the first time, it will be located under the Disabled tab.

  3. Click on the integration entry to open its details page.
  4. Enter the following parameters under the Configuration tab:

    All Feeds

    Parameter Description
    API Hostname Select the appropriate CrowdStrike host.  Options include:
    • US-1: api.crowdstrike.com
    • US-2api.us-2.crowdstrike.com (Default)
    • EU-1api.eu-1.crowdstrike.com
    • US-GOV-1api.laggar.gcw.crowdstrike.com
    CrowdStrike Client ID The CrowdStrike Insight EDR API Client ID to authenticate.
    CrowdStrike Client Secret The CrowdStrike Insight EDR API Client Secret to authenticate.

    CrowdStrike Insight EDR - Detections | Additional Parameters

    Parameter Description
    Confidence Threshold (0-100) The minimum confidence a detection will need to meet to be ingested.  The default setting is 0.
    Severity Threshold (0-100) The minimum severity a detection will need to meet to be ingested.  The default setting is 0.
    Additional Filters (FQL) Enter a FQL query in the field provided to filter the hosts/devices down further.
    Ingested Data Select the data that will be ingested.  Options include:
    • Assets
    • Attack Patterns
    • Events
    • Incidents
    • Indicators

    At least one option must be selected. All options are selected by default.  

    CrowdStrike Insight EDR - Hosts | Additional Parameter

    Parameter Description
    Additional Filters (FQL) Enter a FQL query in the field provided to filter the hosts/devices down further.

    CrowdStrike Insight EDR Detections Configuration
  5. Review any additional settings, make any changes if needed, and click on Save.
  6. Click on the toggle switch, located above the Additional Information section, to enable it.

ThreatQ Mapping

ThreatQuotient provides the following mapping for the CrowdStrike Insight EDR CDF.  

CrowdStrike Insight EDR - Detections

CrowdStrike Insight EDR - Detections and Get Detections by IDs (Supplemental) feeds brings in aggregated detections, along with their behavioral events and related IOCs, into ThreatQ.

This feed retrieves the .resources[] key which is further on used in the Get Detections by IDs (Supplemental) supplemental feed call in order to fetch the rest of data.

GET https://{HOST}/detects/queries/detects/v1

Sample Response

{
    "meta": {
        "query_time": 0.016082104,
        "pagination": {
            "offset": 0,
            "limit": 100,
            "total": 3065
        },
        "powered_by": "msa-api",
        "trace_id": "e0f6d630-1558-42d9-86df-d495d9b7e535"
    },
    "resources": [
        "ldt:4c3db6145a704a179a6dacd924f6e8cc:73697616107",
        "ldt:4c3db6145a704a179a6dacd924f6e8cc:73695566300",
        "ldt:4c3db6145a704a179a6dacd924f6e8cc:73694280199"
    ],
    "errors": []
}

Get Detections by IDs (Supplemental)

This supplemental feed fetches the full details for a given set of detection IDs.

POST https://{HOST}/detects/entities/summaries/GET/v1

Sample Response

{
    "meta": {
        "query_time": 0.016374054,
        "powered_by": "msa-api",
        "trace_id": "08a7c526-0fcc-44c0-bf8d-368b3a661cd7"
    },
    "resources": [
        {
            "cid": "e5d4a79a091448bfb80afc724b3cf952",
            "created_timestamp": "2021-08-31T00:20:57.828992776Z",
            "detection_id": "ldt:4c3db6145a704a179a6dacd924f6e8cc:73693643274",
            "device": {
                "device_id": "4c3db6145a704a179a6dacd924f6e8cc",
                "cid": "e5d4a79a091448bfb80afc724b3cf952",
                "agent_load_flags": "0",
                "agent_local_time": "2021-08-12T12:08:19.328Z",
                "agent_version": "6.27.14105.0",
                "bios_manufacturer": "Xen",
                "bios_version": "4.2.amazon",
                "config_id_base": "65994753",
                "config_id_build": "14105",
                "config_id_platform": "3",
                "external_ip": "54.89.138.42",
                "hostname": "WIN10DETECTION",
                "first_seen": "2021-02-09T16:06:00Z",
                "last_seen": "2021-08-31T00:08:11Z",
                "local_ip": "172.17.0.31",
                "mac_address": "02-7d-30-2b-bc-f7",
                "machine_domain": "csanfr.local",
                "major_version": "10",
                "minor_version": "0",
                "os_version": "Windows 10",
                "platform_id": "0",
                "platform_name": "Windows",
                "product_type": "1",
                "product_type_desc": "Workstation",
                "site_name": "Default-First-Site-Name",
                "status": "normal",
                "system_manufacturer": "Xen",
                "system_product_name": "HVM domU",
                "groups": [
                    "47582c7801a4431e8d81d85aae570cd4"
                ],
                "modified_timestamp": "2021-08-31T00:10:03Z",
                "instance_id": "i-084e546a6695e1412",
                "service_provider": "AWS_EC2",
                "service_provider_account_id": "390847698897"
            },
            "behaviors": [
                {
                    "device_id": "4c3db6145a704a179a6dacd924f6e8cc",
                    "timestamp": "2021-08-31T00:20:17Z",
                    "behavior_id": "5702",
                    "filename": "runningdiskpartmg16.exe",
                    "filepath": "\\Device\\HarddiskVolume2\\Users\\demo\\Desktop\\Malware\\runningdiskpartmg16.exe",
                    "alleged_filetype": "exe",
                    "cmdline": "c:\\Users\\demo\\Desktop\\Malware\\runningdiskpartmg16.exe -k",
                    "scenario": "NGAV",
                    "objective": "Falcon Detection Method",
                    "tactic": "Machine Learning",
                    "tactic_id": "CSTA0004",
                    "technique": "Sensor-based ML",
                    "technique_id": "CST0007",
                    "display_name": "",
                    "description": "This file meets the machine learning-based on-sensor AV protection's high confidence threshold for malicious files.",
                    "severity": 70,
                    "confidence": 70,
                    "ioc_type": "hash_sha256",
                    "ioc_value": "4d4b17ddbcf4ce397f76cf0a2e230c9d513b23065f746a5ee2de74f447be39b9",
                    "ioc_source": "library_load",
                    "ioc_description": "\\Device\\HarddiskVolume2\\Users\\demo\\Desktop\\Malware\\runningdiskpartmg16.exe",
                    "user_name": "WIN10DETECTION$",
                    "user_id": "S-1-5-18",
                    "control_graph_id": "ctg:4c3db6145a704a179a6dacd924f6e8cc:73693643274",
                    "triggering_process_graph_id": "pid:4c3db6145a704a179a6dacd924f6e8cc:656468848626",
                    "sha256": "4d4b17ddbcf4ce397f76cf0a2e230c9d513b23065f746a5ee2de74f447be39b9",
                    "md5": "d1c27ee7ce18675974edf42d4eea25c6",
                    "parent_details": {
                        "parent_sha256": "9077b1aa0afb8db329fded0e51085de1c51b22a986162f29037fca404a80d512",
                        "parent_md5": "",
                        "parent_cmdline": "C:\\Windows\\system32\\services.exe",
                        "parent_process_graph_id": "pid:4c3db6145a704a179a6dacd924f6e8cc:476751454426"
                    },
                    "pattern_disposition": 2304,
                    "pattern_disposition_details": {
                        "indicator": false,
                        "detect": false,
                        "inddet_mask": false,
                        "sensor_only": false,
                        "rooting": false,
                        "kill_process": false,
                        "kill_subprocess": false,
                        "quarantine_machine": false,
                        "quarantine_file": false,
                        "policy_disabled": true,
                        "kill_parent": false,
                        "operation_blocked": false,
                        "process_blocked": true,
                        "registry_operation_blocked": false,
                        "critical_process_disabled": false,
                        "bootup_safeguard_enabled": false,
                        "fs_operation_blocked": false,
                        "handle_operation_downgraded": false,
                        "kill_action_failed": false,
                        "blocking_unsupported_or_disabled": false,
                        "suspend_process": false,
                        "suspend_parent": false
                    }
                }
            ],
            "email_sent": true,
            "first_behavior": "2021-08-31T00:20:17Z",
            "last_behavior": "2021-08-31T00:20:18Z",
            "max_confidence": 70,
            "max_severity": 70,
            "max_severity_displayname": "High",
            "show_in_ui": true,
            "status": "new",
            "hostinfo": {
                "domain": ""
            },
            "seconds_to_triaged": 0,
            "seconds_to_resolved": 0,
            "behaviors_processed": [
                "pid:4c3db6145a704a179a6dacd924f6e8cc:656471670052:5702",
                "pid:4c3db6145a704a179a6dacd924f6e8cc:656474610435:5702",
                "pid:4c3db6145a704a179a6dacd924f6e8cc:656470648952:5702",
                "pid:4c3db6145a704a179a6dacd924f6e8cc:656469680329:5702",
                "pid:4c3db6145a704a179a6dacd924f6e8cc:656468848626:5702"
            ]
        }
    ],
    "errors": []
}

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
resources[].device.machine
_domain + '' + .resources[].device.
hostname + ' (' + data.device.local_ip + ')'
Asset.
Value
N/A .resources[].
device.first_seen
csanfr.local\WIN10
DETECTION (172.17
.0.31)
Will be ingested if the Assets user_field is checked.
.resources[].device.local_ip Asset.
Attribute
IP Address .resources[].
device.first_seen
172.17.0.31 N/A
.resources[].device.hostname Asset.
Attribute
Hostname .resources[].
device.first_seen
WIN10DETECTION N/A
.resources[].device.external
_ip
Asset.
Attribute
External IP Address .resources[].
device.first_seen
54.89.138.42 N/A
.resources[].device.device_id Asset.
Attribute
CrowdStrike Device ID .resources[].
device.first_seen
4c3db6145a704a17
9a6dacd924f6e8cc
N/A
.resources[].device.os_version Asset.
Attribute
Operating System .resources[].
device.first_seen
Windows 10 N/A
.resources[].device.product_
type_desc
Asset.
Attribute
Product Type .resources[].
device.first_seen
Workstation N/A
.resources[].device.site_name Asset.
Attribute
Site Name .resources[].
device.first_seen
Default-First-Site-
Name
N/A
.resources[].device.status Asset.
Attribute
Status .resources[].
device.first_seen
normal N/A
.resources[].device.service_
provider
Asset.
Attribute
Service Provider .resources[].
device.first_seen
AWS_EC2 N/A
.resources[].device.detection
_suppression_status
Asset.
Attribute
Detection Suppression Status .resources[].
device.first_seen
unsuppressed N/A
.resources[].device.service_
provider
Asset.
Attribute
Service Provider .resources[].
device.first_seen
AWS_EC2 N/A
.resources[].device.host_
hidden_status
Asset.
Attribute
Host Hidden Status .resources[].
device.first_seen
visible N/A
.resources[].device.ou Asset.
Attribute
Organizational Unit .resources[].
device.first_seen
Domain Controllers N/A
.resources[].device.reduced_
functionality_mode
Asset.
Attribute
Reduced Functionality Mode .resources[].
device.first_seen
no N/A
.resources[].device.provision
_status
Asset.
Attribute
Provision Status .resources[].
device.first_seen
Provisioned N/A
.resources[].device.zone
_group
Asset.
Attribute
Zone Group .resources[].
device.first_seen
us-east-1a N/A
.resources[].behaviors[].
filename
Indicator.
Value
Filename .resources[].behaviors
[].timestamp
runningdiskpartmg
16.exe
The status of the indicator is Indirect. Will be ingested if the Indicators user_field is checked.
.resources[].behaviors[].
filepath
Indicator.
Value
File Path .resources[].behaviors
[].timestamp
\Device\HarddiskVo
lume2\Users\demo\
Desktop\Malware\ru
nningdiskpartmg16.
exe
The status of the indicator is Indirect. Will be ingested if the Indicators user_field is checked.
.resources[].behaviors[].
user_name
Indicator.
Value
Username .resources[].behaviors
[].timestamp
dstyres The status of the indicator is Indirect. Will be ingested if the Indicators user_field is checked.
.resources[].behaviors[].
md5
Indicator.
Value
MD5 .resources[].behaviors
[].timestamp
d1c27ee7ce1867597
4edf42d4eea25c6
The status of the indicator is Indirect. Will be ingested if the Indicators user_field is checked.
.resources[].behaviors[].
sha256
Indicator.
Value
SHA-256 .resources[].behaviors
[].timestamp
4d4b17ddbcf4ce397
f76cf0a2e230c9d513
b23065f746a5ee2de
74f447be39b9
The status of the indicator is Indirect. Will be ingested if the Indicators user_field is checked.
.resources[].behaviors[].
alleged_filetype
Indicator.
Attribute
Alleged File Type .resources[].behaviors
[].timestamp
exe N/A
.resources[].behaviors[].
confidence
Indicator.
Attribute
Confidence .resources[].behaviors
[].timestamp
70 N/A
.resources[].behaviors[].
severity
Indicator.
Attribute
Severity .resources[].behaviors
[].timestamp
70 N/A
.resources[].behaviors[].
ioc_type
Indicator.
Type
N/A .resources[].behaviors
[].timestamp
SHA-256 Mapped by using the CrowdStrike Detection Type Mapping table below.
.resources[].behaviors[].
ioc_value
Indicator.
Value
N/A .resources[].behaviors
[].timestamp
4d4b17ddbcf4ce397
f76cf0a2e230c9d513
b23065f746a5ee2de
74f447be39b9
Will be ingested if the Indicators user_field is checked.
.resources[].behaviors[].
ioc_description
Indicator.
Description
N/A .resources[].behaviors
[].timestamp
\Device\HarddiskVo
lume2\Users\demo\
Desktop\Malware\ru
nningdiskpartmg16.
exe
N/A
.resources[].behaviors[].
ioc_source
Indicator.
Attribute
IOC Source .resources[].behaviors
[].timestamp
library_load N/A
.resources[].max_severity
_displayname + 'Severity Detection on' + .resources[].device.
hostname + '-' + .resources[].detection_id
Incident.
Value
N/A .resources[].created
_timestamp
High Severity Detection on WIN10DETECTION - ldt:4c3db61
45a704a179a6
dacd924f6e8cc:7369
3643276
Will be ingested if the Incidents user_field is checked.
.resources[].first_behavior Incident.
Started_at
N/A N/A 2021-08-31T02:30:59 N/A
.resources[].last_behavior Incident.
Ended_at
N/A N/A 2021-08-31T02:30:59 N/A
.resources[].email_sent Incident.
Attribute
Email Sent .resources[].created
_timestamp
True N/A
.resources[].max_severity Incident.
Attribute
Max Severity .resources[].created
_timestamp
10 N/A
.resources[].max_
confidence
Incident.
Attribute
Max Confidence .resources[].created
_timestamp
100 N/A
.resources[].
max_severity
_displayname
Incident.
Attribute
Severity .resources[].created
_timestamp
Medium N/A
.resources[].detection_id Incident.
Attribute
CrowdStrike Detection ID .resources[].created
_timestamp
ldt:4c3db6145a704a1
79a6dacd924f6e8cc:7
3619780939
N/A
.resources[].status Incident.
Attribute
Status .resources[].created
_timestamp
new N/A
.resources[].seconds_to
_resolved
Incident.
Attribute
Seconds to Resolved .resources[].created
_timestamp
0 N/A
.resources[].seconds_to
_triaged
Incident.
Attribute
Seconds to Triaged .resources[].created
_timestamp
70 N/A
.resources[].quarantined
_files
Incident.
Attribute
Quarantined Files .resources[].created
_timestamp
70 Number of items in .resources[].quarantined_files
.resources[].behaviors[].
technique_id + ' - ' + .resources[].behaviors[]
.technique
Attack
Pattern.
Value
N/A .resources[].behaviors
[].timestamp
CST0017 - Sensor-based ML If .resources[].behaviors[].
technique_id is a known Mitre Attack, the already existing attack pattern is linked to the objects. The object will be ingested/linked if the Attack Patterns user_field is checked.
.resources[].behaviors[]
.tactic
Attack Pattern.
Attribute
Tactic .resources[].behaviors
[].timestamp
Machine Learning The attribute is added only to new attack patterns
.resources[].behaviors[]
.scenario + ':' + .resources
[].behaviors[]
.description
Event.
Title
N/A .resources[].behaviors
[].timestamp
Ngav: This file meets the machine learning-based on-sensor AV protection's high confidence threshold for malicious files. Will be ingested if the Events user_field is checked. The Event Type is Detection
.resources[].behaviors[]
.description
Event.
Description
N/A .resources[].behaviors
[].timestamp
This file meets the machine learning-based on-sensor AV protection's high confidence threshold for malicious files. N/A
.resources[].behaviors[]
.display_name
Event.
Attribute
Behavior .resources[].behaviors
[].timestamp
machine learning N/A
.resources[].behaviors[]
.ioc_source
Event.
Attribute
IOC Source .resources[].behaviors
[].timestamp
library_load N/A
.resources[].behaviors[]
.objective
Event.
Attribute
Behavior Objective .resources[].behaviors
[].timestamp
Falcon Detection Method N/A

CrowdStrike Detection Type Mapping

The CrowdStrike Detection Type (as found in .resources[].behaviors[].ioc_type in the Get Detections by IDs Supplemental feed) to ThreatQ Type mapping is as follows:

Crowdstrike Indicator Type ThreatQ Indicator Type
domain FQDN
filename Filename
hash_md5 MD5
hash_sha256 SHA-256
registry_key Registry Key

CrowdStrike Insight EDR - Hosts

CrowdStrike Insight EDR - Hosts and Get Host by IDs (Supplemental) feeds brings in aggregated detections into ThreatQ.

This feed retrieves the .resources[] key which is further on used in the Get Host by IDs (Supplemental) supplemental feed call in order to fetch the details.

GET https://{HOST}/detects/entities/summaries/GET/v1

{
    "meta": {
        "query_time": 0.016082104,
        "pagination": {
            "offset": 0,
            "limit": 100,
            "total": 3065
        },
        "powered_by": "msa-api",
        "trace_id": "e0f6d630-1558-42d9-86df-d495d9b7e535"
    },
    "resources": [
        "0b5abb999c1544f1af71983753ff8d22",
        "3eb0e8e03d1245eaa643046f84bc51f8",
        "3fd9b8a8a7ba426a9bf3aaa2ddfc5b02"
    ],
    "errors": []
}

Get Host by IDs (Supplemental)

This supplemental feed fetches the full details for a given host IDs.

POST https://{HOST}/devices/entities/devices/v2

Sample Response

{
  "meta": {
    "query_time": 0.005269768,
    "powered_by": "device-api",
    "trace_id": "d04ebb63-4aab-48ec-a7bc-5495bc6f0f03"
  },
  "resources": [
    {
      "device_id": "3fd9b8a8a7ba426a9bf3aaa2ddfc5b02",
      "cid": "e5d4a79a091448bfb80afc724b3cf952",
      "agent_load_flags": "0",
      "agent_local_time": "2021-10-21T22:05:09.512Z",
      "agent_version": "6.30.14406.0",
      "bios_manufacturer": "American Megatrends Inc.",
      "bios_version": "090008 ",
      "build_number": "19042",
      "config_id_base": "65994753",
      "config_id_build": "14406",
      "config_id_platform": "3",
      "cpu_signature": "329303",
      "external_ip": "20.58.113.63",
      "mac_address": "00-22-48-00-63-1f",
      "instance_id": "3c4c3d6f-fa6d-44d3-8a29-1e7d16ce5dfd",
      "service_provider": "AZURE",
      "service_provider_account_id": "ec5c2f3b-9a85-498b-b609-e81a8e6e2cbd",
      "hostname": "SENTINEL-C-02",
      "first_seen": "2021-06-01T07:48:08Z",
      "last_seen": "2021-10-26T10:11:57Z",
      "local_ip": "172.18.0.9",
      "machine_domain": "illusive-sacumen.com",
      "major_version": "10",
      "minor_version": "0",
      "os_version": "Windows 10",
      "os_build": "19042",
      "ou": [],
      "platform_id": "0",
      "platform_name": "Windows",
      "policies": [
        {
          "policy_type": "prevention",
          "policy_id": "fcde00f4eef9466c8578f2dc587b437a",
          "applied": true,
          "settings_hash": "adc849a6",
          "assigned_date": "2021-09-02T00:14:29.894848191Z",
          "applied_date": "2021-09-02T00:16:03.578241038Z",
          "rule_groups": []
        }
      ],
      "reduced_functionality_mode": "no",
      "device_policies": {
        "prevention": {
          "policy_type": "prevention",
          "policy_id": "fcde00f4eef9466c8578f2dc587b437a",
          "applied": true,
          "settings_hash": "adc849a6",
          "assigned_date": "2021-09-02T00:14:29.894848191Z",
          "applied_date": "2021-09-02T00:16:03.578241038Z",
          "rule_groups": []
        },
        "sensor_update": {
          "policy_type": "sensor-update",
          "policy_id": "5b568dec090c480b808830586c134441",
          "applied": true,
          "settings_hash": "65994753|3|2|automatic;101",
          "assigned_date": "2021-10-21T22:03:38.322395302Z",
          "applied_date": "2021-10-21T22:06:51.608393214Z",
          "uninstall_protection": "ENABLED"
        },
        "device_control": {
          "policy_type": "device-control",
          "policy_id": "25d6ae9765624a0b9c1ec577836a8925",
          "applied": true,
          "assigned_date": "2021-10-21T00:51:26.169208737Z",
          "applied_date": "2021-10-21T00:56:09.944670879Z"
        },
        "global_config": {
          "policy_type": "globalconfig",
          "policy_id": "dc483372e2474e2fb5efc99a49a80fc1",
          "applied": true,
          "settings_hash": "c6c03d6",
          "assigned_date": "2021-10-21T22:06:57.220323195Z",
          "applied_date": "2021-10-21T22:08:24.58680563Z"
        },
        "remote_response": {
          "policy_type": "remote-response",
          "policy_id": "ab8edf33dd1e4a178eac44f2b4fc2c25",
          "applied": true,
          "settings_hash": "f472bd8e",
          "assigned_date": "2021-06-01T07:49:34.07955937Z",
          "applied_date": "2021-06-01T07:49:53.428657794Z"
        },
        "firewall": {
          "policy_type": "firewall",
          "policy_id": "b07aa203e1b24a1581b5403390746a36",
          "applied": true,
          "assigned_date": "2021-10-21T00:51:26.169225468Z",
          "applied_date": "2021-10-21T00:56:10.455799263Z",
          "rule_set_id": "b07aa203e1b24a1581b5403390746a36"
        }
      },
      "groups": [],
      "group_hash": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
      "product_type": "1",
      "product_type_desc": "Workstation",
      "provision_status": "Provisioned",
      "serial_number": "0000-0004-3449-1529-1657-8152-51",
      "service_pack_major": "0",
      "service_pack_minor": "0",
      "pointer_size": "8",
      "site_name": "Default-First-Site-Name",
      "status": "contained",
      "system_manufacturer": "Microsoft Corporation",
      "system_product_name": "Virtual Machine",
      "tags": [],
      "modified_timestamp": "2021-10-26T10:12:02Z",
      "slow_changing_modified_timestamp": "2021-10-26T10:05:23Z",
      "meta": {
        "version": "11755"
      },
      "zone_group": "Sentinel"
    }
  ],
  "errors": []
}

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.resources[].machine_domain + '' + .resources[].hostname + '(' + .resources[].local_ip + ')' Asset.Value N/A .resources[].first_seen illusive-sacumen.com\
SENTINEL-C-02 (172.18.0.9)
N/A
.resources[].local_ip Asset.Attribute IP Address .resources[].first_seen 172.17.0.31 N/A
.resources[].hostname Asset.Attribute Hostname .resources[].first_seen WIN10DETECTION N/A
.resources[].external_ip Asset.Attribute External IP Address .resources[].first_seen 54.89.138.42 N/A
.resources[]_id Asset.Attribute CrowdStrike Device ID .resources[].first_seen 4c3db6145a704a179a6
dacd924f6e8cc
N/A
.resources[].os_version Asset.Attribute Operating System .resources[].first_seen Windows 10 N/A
.resources[].product_type_desc Asset.Attribute Product Type .resources[].first_seen Workstation N/A
.resources[].site_name Asset.Attribute Site Name .resources[].first_seen Default-First-Site-Name N/A
.resources[].status Asset.Attribute Status .resources[].first_seen normal N/A
.resources[].service_provider Asset.Attribute Service Provider .resources[].first_seen AWS_EC2 N/A
.resources[].detection_suppression_status Asset.Attribute Detection Suppression Status .resources[].first_seen unsuppressed N/A
.resources[].service_provider Asset.Attribute Service Provider .resources[].first_seen AWS_EC2 N/A
.resources[].host_hidden_status Asset.Attribute Host Hidden Status .resources[].first_seen visible N/A
.resources[].ou Asset.Attribute Organizational Unit .resources[].first_seen Domain Controllers N/A
.resources[].reduced_functionality_mode Asset.Attribute Reduced Functionality Mode .resources[].first_seen no N/A
.resources[].provision_status Asset.Attribute Provision Status .resources[].first_seen Provisioned N/A
.resources[].zone_group Asset.Attribute Zone Group .resources[].first_seen us-east-1a N/A
.resources[].tags[] Asset.Tag N/A N/A FalconGroupingTags/
testtag
N/A

Average Feed Run

Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.

CrowdStrike Insight EDR - Hosts

Metric Result
Run Time 1 minute
Assets 3
Asset Attributes 41

CrowdStrike Insight EDR - Detections

Metric Result
Run Time 1 minute
Assets 1
Asset Attributes 9
Attack Patterns 4
Attack Pattern Attributes 3
Events 2
Event Attributes 10
Incidents 1
Incident Attributes 9
Indicators 9
Indicator Attributes 14

Known Issues / Limitations

  • As of the release of version 1.0.3, Host Groups cannot be customized.  All indicators will be applied globally.  

Change Log

  • Version 1.1.1 rev-a
    • Guide Update - added a section, CrowdStrike Client API Configuration, to the Prerequisites section of the guide.  
  • Version 1.1.1
    • Removed the CrowdStrike Insight EDR - IOC Export feed as it has now been incorporated into the CrowdStrike Insight EDR Action Bundle integration.  
  • Version 1.1.0
    • CrowdStrike Insight EDR - IOC Export - Added the following new configuration options:
      • Policy for MD5, SHA256 Indicators
      • Policy for Domain, ipv4, ipv6 Indicators 
  • Version 1.0.5
    • Updated the Get Host by IDs supplemental feed endpoint to v2.
  • Version 1.0.4
    • Added check to CrowdStrike Insight EDR - IOC Export in order to verify if indicators already exist in CrowdStrike. Trying to add an existing one will throw an error and will stop any of the indicators from being added.
  • Version 1.0.3
    • Updated the CrowdStrike Insight EDR - IOC Export endpoint's URL and body.  
    • Added Default Platform configuration parameter.
    • Removed the Policy Type configuration parameter.  
  • Version 1.0.2 rev-a
    • Updated Custom Object installation steps in the Prerequisites chapter.  
  • Version 1.0.2
    • Fixed an issue where custom object files were missing from the integration download.  Updated documentation with steps to install the Asset custom object - see the Prerequisites chapter.  
    • Added an Attack Pattern object from Behavior Techniques data in CrowdStrike Insight EDR - Detections Feed.
    • Removed Behavior Technique and Behavior Tactic attributes.
    • Removed the Ingest Behavior Events option from the  CrowdStrike Insight EDR - Detections feed configuration.
    • Users can now select what data will be ingested in ThreatQ by selecting the appropriate option(s) in CrowdStrike Insight EDR - Detections feed configuration.
  • Version 1.0.1
    • Added a new API Host configuration parameter that will allow you to select a CrowdStrike host.  See step 4 in the Configuration chapter for more information.  
  • Version 1.0.0
    • Initial release